Secure memory card with life cycle phases

A memory card and security card technology, which can be used to detect faulty computer hardware, record carriers used by machines, prevent unauthorized use of memory, etc., and can solve problems such as high cost

Inactive Publication Date: 2008-04-16
三因迪斯克技术有限公司 +1
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it is very costly to manufacture a memory card with a single integrated circuit die that can store a large amount of information (on the order of several gigabytes in 2005 and increasing), and a security system must be developed that employs multiple dies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure memory card with life cycle phases
  • Secure memory card with life cycle phases
  • Secure memory card with life cycle phases

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] memory system structure

[0018] Figure 1A The block diagram of FIG. 2 illustrates an example memory system in which various aspects of the invention may be implemented. Such as Figure 1A As shown, memory system 10 includes central processing unit (CPU) or controller 12, buffer management unit (BMU) 14, host interface module (HIM) 16, flash interface module (FIM) 18, flash memory 20, and peripheral memory Take module 22. Memory system 10 communicates with host device 24 through host interface bus 26 and port 26a. Flash memory 20 , which may be a NAND type, provides data storage for host device 24 . Software code for CPU 12 may also be stored in flash memory 20 . FIM 18 is connected to flash memory 20 by flash interface bus 28 and, in some cases, by ports (not shown) if flash memory 20 is a removable component. The HIM 16 is suitable for connection to host systems such as digital cameras, personal computers, personal digital assistants (PDAs) and MP-3 players, cell...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain of the states. The testing mechanisms are disabled in certain other of the states thus closing potential back doors to secure data and cryptographic keys. Controlled availability and generation of the keys required for encryption and decryption of data is such that even if back doors are accessed that previously encrypted data is impossible to decrypt and thus worthless even if a back door is found and maliciously pried open.

Description

technical field [0001] The present invention relates generally to memory cards and encryption, and in particular to eliminating access to secure data and keys through testing mechanisms in the card. Background technique [0002] Some time ago, a type of smart memory card, commonly referred to as a smart card, was developed and accepted in the market as a form of identification and payment. Smart cards contain a small amount of memory for storing user identification data and for storing transaction related data. Smart cards are also often referred to as chip cards and are used in Japan for various things such as national identification cards and in many places as a type of credit or debit card. To prevent identity theft and other monetary fraud, various chip designs and encryption schemes have been employed in the cards and systems utilizing them. [0003] In designing and manufacturing any type of secure memory card, there are two competing concerns. One concern is to max...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/22G06K19/07G06F21/60G06F21/62G06F21/72
CPCG06F11/2273G06K19/07G06F1/00G06F12/14
Inventor 迈克尔·霍尔茨曼巴鲁赫·鲍里斯·科亨罗恩·巴尔齐莱哈加伊·巴-埃尔戴维·戴切尔
Owner 三因迪斯克技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products